Résumé or Curriculum Vitae

Résumé or Curriculum Vitae

Christopher Short

Professional Summary

Seasoned, passionate, results producing DevOps professional; wide range of experiences and skills managing numerous aspects of Linux systems (Red Hat/CentOS), network administration, IT Operations, and Development Operations. Coordinated multiple projects with competing priorities involving WAN/LAN and systems design, implementation, configuration, hardening, administration, and maintenance. Expertise in troubleshooting hardware, software, and network issues in high-pressure situations. Prolific blogger, DZone contributor, and speaker at DevOpsDays Detroit 2016.

Skills

Software

Red Hat Enterprise Linux (3 - 7), CentOS (4 - 7), Debian, Ubuntu, Fedora, Mac OS X, macOS, Cisco IOS, Windows Server, Windows, Google Apps, Microsoft Office, Office365, Evernote, Microsoft Visio (2003, 2007), Microsoft Project 2007, Xymon, EM7, Nagios, VIM, WireShark, NMAP, IPTraf, MRTG, HTML, CSS, nginx, Apache httpd, IIS, MySQL, Bash, PHP, Perl, Python, Remedy, JIRA, Parature, MediaWiki, Ansible, Puppet, Cobbler, BIND, cron, LVM, Subversion, Git, Mercurial, YUM, RPM, APT, IPTables, sed, curl, VMWare vSphere Client, Akamai, CloudFlare, TippingPoint SMS, VirtualBox, Vagrant, Slack, HipChat, FlowDock, Percona Server, Percona Toolkit, Burp Suite, AWS S3, AWS SQS, AWS EC2, Rackspace Cloud, Docker, Test Kitchen, Serverspec, GitLab, GitHub, New Relic, Datadog

Hardware

Cisco 5500 ASAs, Brocade SX 1600, BNT Blade Switch, Avaya/Nortel ERS 5510, TippingPoint IDS/IPS, Dell, IBM, HP, Fujitsu Servers, Oscilloscopes, Multi-meters, Fireberd 6000A, Fluke EtherScopes, Network/Protocol Analyzers, Fiber Optic Modems, PairGains, NSA Approved Encryption Devices

Protocols

DHCP, DNS, Ethernet, FTP, HTTP, IP, NTP, POP, RSYNC, SCP, SFTP, SMTP, SNMP, SSH, TCP/IP, TFTP, Telnet

Professional Experience

June 2016-Present - Global DevOps Engineer - Solarwinds MSP - Durham, NC

  • Worked with product teams to improve documentation of Ansible development environments; identified additional tests for Ansible roles that could be done via Test Kitchen, Docker, and Serverspec or GitLabCI
  • Converted 300 GB MySQL table from MyISAM to InnoDB utilizing existing backup, MySQL replication, and Rackspace OnMetal instance; converted to more tolerant storage engine consistent with app architecture
  • Upgraded internal and customer TLS/SSL Apache Web Server configurations; trained staff on proper implementations, potential issues/concerns, and automated changes with Ansible
  • Utilized AWS EC2 and SQS in tandem with systemd and custom AMIs as well as existing application code to build job servers that would collect, verify, and purge duplicate copies of archived mail messages in AWS S3

Dec 2015-June 2016 - Senior IT Analyst - Duke School of Medicine, Office of Research Informatics - Durham, NC

  • Instituted configuration and systems management via Ansible; inventoried and standardized system configurations and package installations; trained other team members in the use of Git and Ansible
  • Identified inefficiencies in proxy and load balancing systems; interfaced with networking team members to utilize F5 load balancer for SSL termination, load balancing, proxying, and Shibboleth single sign-on
  • Worked with Duke Health Technology Solutions Windows Team to connect Linux to Windows environment for researchers working on the Duke Apple ResearchKit application, Autism & Beyond
  • Collaborated with vendor to build an Ansible Playbook and Role to standardize system setup and Ruby on Rails application deployment; enforced application configuration, security settings, and user management

July 2015-Dec 2015 - Systems and Security Engineer - LCMS Plus, Inc - Chapel Hill, NC

  • Created standardized naming scheme; utilized Ansible to programmatically implement system configuration settings on Fedora/RHEL systems; multiple discrepancies eliminated across systems in two cloud environments
  • Audited and standardized SSL implementations across all systems ensured best practices were being followed; used Ansible to improve Qualys SSL Labs scoring from failing to A ratings in most cases for customer installations
  • Improved DNS configurations/security while changing provider to CloudFlare; created standardized SMTP implementation making use of Mandrill to insure messages created within application were reaching customers
  • Repaired multiple failures in MySQL replication across environments; created standard process to convert tables from MyISAM to InnoDB and rebuild replicants; improved capabilities/performance in database and application
  • Provided guidance to developers on modern systems and PHP application architectures; audited application for potential security vulnerabilities and worked with teams to answer questions and mitigate identified issues

May 2014-July 2015 - Platform Support Engineer - Windstream Hosted Solutions - Cary, NC

  • Instituted Ansible for configuration management and automation across four environments; guaranteed 100% reproducible system setup fixing numerous systems issues and speeding implementation time
  • Worked hand-in-hand with development team to identify/resolve cloud portal issues; eliminated bugs and identified need to break up functions across multiple systems before customers adversely impacted
  • Instituted patching policy for both Linux and Windows systems allowing patching on pre-existing schedule; reduced number of outstanding vulnerabilities; secured systems with minimal down time

Mar 2014-May 2014 - Linux System Administrator - Cree - Durham, NC

  • Identified discrepancies in Oracle support documentation; worked with Oracle/Cree developers to update documentation; helped Oracle to provide robust RPM; drove teams toward a best practice implementation
  • Described issues with and changed an "install everything" mentality in Linux environments; guided stakeholders toward better understanding of what applications needed to run leading to more efficient system provisioning
  • Stood up Linux systems monitoring using Xymon Monitor server; provided near real time data giving IT data used to "right size" Factory Automation systems; identified lack of perceived bottlenecks in Oracle EBS systems

June 2012-Mar 2014 - Network/Systems Security Engineer - McClatchy Interactive - Raleigh, NC

  • Charged with configuring DHCP, TFTP and Cobbler to enable unattended PXEBoot Linux server provisioning
  • Installed and maintained two HP TippingPoint IDS/IPS systems in primary and secondary data centers as well as TippingPoint Security Management System; designed data center protection plan to meet company goals
  • Bolstered time services by enhancing NTP server scheme; added CDMA time receiver in primary data center providing accurate timing to two data centers; optimized NTP system for operations during site isolation
  • Decommissioned 200+ defunct, compromised Drupal sites; removed vulnerabilities and cleaned up systems

Feb 2012-June 2012 - Linux Systems Administrator - College Foundation, Inc. - Raleigh, NC

  • Spearheaded NIST compliance efforts on RHEL 5 and 6 systems used for federal student loans program; applied Security Technical Implementation Guides in accordance with company priorities; created standard image
  • Trained network admins and instructed IT staff on Network Time Protocol and best practices for implementation; engineered/implemented RHEL 6 based, NIST compliant NTP server in under 8 hours
  • Instilled sound, best practice administration standards eliminating “wild west” mentality; standardized configurations on mail systems and network devices that were performing identical duties in two locations
  • Built RHEL 6 boxes using custom Kickstart config file to meet requirements of WebSphere administrator

Jan 2011-Feb 2012 - Support Operations Specialist - McClatchy Interactive - Raleigh, NC

  • Tasked with ensuring RHEL 3 and CentOS 5 Linux servers and network infrastructure used to max efficiency
  • Proactively addressed proprietary CMS errors/warnings to stave off emergencies; developed best practices for use during network/server outages. Created/disseminated documentation to entire support team
  • Identified/corrected several web site inefficiencies that contributed to excessive bandwidth utilization through Akamai. Saved company $2,000.00/month in overage costs. Employee of the Month – June 2011
  • Performed configuration management on 98 production Linux servers hosting 96 web sites across 30 US markets for the 3rd largest newspaper company in the US; successfully steered operational goals and tasks

Nov 1999-Dec 2010 – Cyber Transport Systems / Communications, Computer Systems Controller - US Air Force

  • Designed 440th Airlift Wing network enterprise—eliminated redundant infrastructure; reduced overall project cost by $13+ million. Awarded 43d Airlift Wing Communications & Information NCO of the Year
  • Trained 24 operators on General Dynamics Joint Biological Point Detection System; re-engineered wireless network capabilities ensuring operational capabilities; credited with saving $900 million defense program
  • Procured, designed, and installed RHEL 5 based Cacti device monitor to replace aging CiscoWorks 2000 software; trained 30 technicians on basic Linux administration while opening eyes to open source software
  • Trained personnel on use of 16 proprietary Unix based network monitoring systems; taught previously untrained technicians about basics of file systems, navigation, and use of available devices and interfaces
  • Identified US Central Command classified network Cisco router configuration flaw that baffled previous technicians; enabled necessary keepalive and restored network connectivity to forward deployed task force
  • Installed USAF ACC first ever Linux based network monitor during joint experiment to alert on network anomalies

Education and Certifications

  • AAS, Community College of the Air Force, Electronic Systems Technology, Aug 2010
  • CompTIA Network+ (Verification ZZ6VGN6LSCBEYCBN)
  • Red Hat Certified System Administrator (RHEL 6 - Certification ID: 120-179-858)
  • Enterasys Certified Specialist - Switching NMS (License a1780000000eXhqAAE)

Formal Training Courses

Global Knowledge Network Security I & II, UNIX/LINUX Security Course, Defense Information Systems Agency CONUS Telecom Seminar, Information Technology Infrastructure Library (ITIL) Foundation Workshop, USAF Communications-Computer Systems Control Apprentice & Craftsman Courses, REDCOM Theory and Application Training Course in Distributed Digital Switching, Microsoft Learning Course 5927A: Microsoft Office Project 2007, Managing Projects, RHCSA Rapid Track Course, Enterasys Switching NMS, Puppet Fundamentals Training, Pentaho Business Analytics User Console Training

Chris Short

Chris Short

https://chrisshort.net